[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Mostafavi et al., 2019 - Google Patents

Fog computing architectures, privacy and security solutions

Mostafavi et al., 2019

View PDF
Document ID
1903607834693026619
Author
Mostafavi S
Shafik W
Publication year
Publication venue
Journal of Communications Technology, Electronics and Computer Science

External Links

Snippet

Fog computing is a promising computing paradigm that extends cloud computing to the edge of networks where it provides services closer to users characterized by closer proximity to end-users and bigger geographical distribution, local resource pooling, latency reduction …
Continue reading at ojs.jctecs.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls

Similar Documents

Publication Publication Date Title
Mostafavi et al. Fog computing architectures, privacy and security solutions
US11750659B2 (en) Cybersecurity profiling and rating using active and passive external reconnaissance
Abiodun et al. A review on the security of the internet of things: Challenges and solutions
US20220014560A1 (en) Correlating network event anomalies using active and passive external reconnaissance to identify attack information
AlAhmad et al. Mobile cloud computing models security issues: A systematic review
US11601475B2 (en) Rating organization cybersecurity using active and passive external reconnaissance
US11303659B2 (en) Detecting inappropriate activity in the presence of unauthenticated API requests using artificial intelligence
US12058177B2 (en) Cybersecurity risk analysis and anomaly detection using active and passive external reconnaissance
Nartey et al. On blockchain and IoT integration platforms: current implementation challenges and future perspectives
Lee et al. On security and privacy issues of fog computing supported Internet of Things environment
US12041091B2 (en) System and methods for automated internet- scale web application vulnerability scanning and enhanced security profiling
Yakubu et al. Security challenges in fog-computing environment: a systematic appraisal of current developments
US10979452B2 (en) Blockchain-based malware containment in a network resource
US20210281609A1 (en) Rating organization cybersecurity using probe-based network reconnaissance techniques
Khan et al. A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing
Gulzar et al. Internet of things security: a survey and taxonomy
Alotaibi A survey on industrial Internet of Things security: Requirements, attacks, AI-based solutions, and edge computing opportunities
US20230362142A1 (en) Network action classification and analysis using widely distributed and selectively attributed sensor nodes and cloud-based processing
Gupta Non-functional requirements elicitation for edge computing
US20230283641A1 (en) Dynamic cybersecurity scoring using traffic fingerprinting and risk score improvement
Islam et al. A comprehensive data security and forensic investigation framework for cloud-iot ecosystem
Benaddi et al. A review: Collaborative intrusion detection for IoT integrating the blockchain technologies
Yan et al. Graph mining for cybersecurity: A survey
Rajesh et al. Network forensics investigation in virtual data centers using elk
Prithi et al. Trust Management Framework for Handling Security Issues in Multi-cloud Environment